Euler (EUL) sustainability report

NameBlockNodes SAS
Relevant legal entity identifier969500PZJWT3TD1SUI59
Name of the crypto-assetEuler
Beginning of the period to which the disclosure relates2025-04-29
End of the period to which the disclosure relates2026-04-29
Energy consumption1884.93205 kWh/a

Consensus Mechanism

Euler is present on the following networks: Arbitrum, Avalanche, Base, Berachain, Binance Smart Chain, Ethereum, Sonic.

Arbitrum, an innovative Layer 2 scaling solution built on top of Ethereum, utilizes an Optimistic Rollup consensus mechanism to significantly enhance transaction scalability and reduce operational costs. This optimistic approach operates on the fundamental assumption that all transactions processed off-chain are valid by default. Consequently, transactions only undergo a rigorous verification process if their validity is explicitly challenged during a specific time window.

The core architecture of the Arbitrum network integrates several key components essential for its functionality. The Sequencer plays a pivotal role by efficiently ordering user transactions and aggregating them into batches, which are then processed off-chain. This mechanism is critical for achieving high transaction throughput and maintaining network efficiency. A Bridge facilitates secure and seamless transfers of assets between the Arbitrum Layer 2 environment and the underlying Ethereum Layer 1 mainnet, ensuring interoperability and leveraging Ethereum's robust security. Safeguarding the network from malicious activities are Fraud Proofs, an interactive verification system designed to detect and invalidate fraudulent transactions.

The transaction verification process unfolds as follows: users first submit their transactions to the Arbitrum Sequencer. The Sequencer orders these transactions, bundles them into batches, and subsequently submits these batches along with a cryptographic "state commitment" to the Ethereum mainnet. A crucial "challenge period" then commences, during which any network validator can initiate a fraud proof if they suspect an invalid state transition. Should a challenge be raised, an iterative dispute resolution protocol is activated to pinpoint the exact fraudulent step. If fraud is confirmed, the system rolls back the incorrect state, and the dishonest party is subjected to penalties. The final, validated state is then executed on the Ethereum blockchain, preserving the rollup's integrity. This combination of off-chain computation, batching, and on-chain fraud detection, as seen in networks built on the Arbitrum Nitro stack like Kinto, enables high transaction volumes at considerably lower fees.

The Avalanche blockchain network implements a sophisticated Proof-of-Stake (PoS) mechanism known as Avalanche Consensus, distinguishing itself from many other PoS protocols by incorporating a novel, subsampling-based approach rather than a traditional Byzantine Fault Tolerant (BFT) consensus. This unique consensus process is built upon three integrated protocols: Snowball, Snowflake, and Avalanche, all working in concert to achieve high throughput, rapid finality, and robust security. The process begins with the Snowball protocol, where each validator randomly samples a small, fixed-size group of other validators. Through repeated polling of these sampled validators, a preference for a particular transaction is established. Validators maintain confidence counters for each transaction, incrementing them as sampled validators express support for their chosen transaction. A transaction is deemed accepted once its confidence counter surpasses a predefined threshold. Building upon Snowball, the Snowflake protocol refines the process by introducing a binary decision system, compelling validators to choose between two conflicting transactions. Binary confidence counters track the preferred binary choice, and once a specific confidence level is attained, the decision becomes final and irreversible. The overarching Avalanche protocol organizes transactions using a Directed Acyclic Graph (DAG) structure. This DAG architecture is crucial for facilitating parallel transaction processing, which significantly enhances the network's overall throughput and efficiency. Transactions are added to the DAG based on their intrinsic dependencies, ensuring a consistent and logical order across the network. Ultimately, validators reach consensus on both the structure and content of this DAG through the iterative application of the Snowball and Snowflake protocols. The Avalanche X-Chain, a component of the broader Avalanche network, also utilizes this Avalanche consensus protocol, emphasizing repeated subsampling of validators to achieve agreement on transactions. Furthermore, networks like Flare integrate the Avalanche Consensus with a Federated Byzantine Agreement (FBA) model to further bolster scalability, security, and decentralization, leveraging a gossip protocol for rapid node communication and transaction confirmation.

Base operates as a Layer-2 (L2) scaling solution built on the Ethereum blockchain, having been developed by Coinbase using Optimism's OP Stack. Critically, Base L2 transactions do not possess an independent consensus mechanism. Instead, their validation is directly linked to and secured by the underlying Ethereum Layer-1 (L1) network. This is achieved through a specialized component known as a sequencer. The sequencer's role is to aggregate multiple L2 transactions into bundles, which are then regularly published to the Ethereum mainnet as a single L1 transaction.

Consequently, all transactions processed on the Base network are indirectly secured by Ethereum's robust Proof-of-Stake (PoS) consensus mechanism once they are recorded on L1. Ethereum's PoS system, established with "The Merge" in 2022, moves away from energy-intensive mining by requiring validators to stake at least 32 ETH. In this system, a validator is randomly selected every 12 seconds to propose a new block, while other validators on the network are responsible for verifying its integrity. The network employs a sophisticated slot and epoch system, with transaction finality typically occurring after two epochs, which translates to approximately 12.8 minutes, utilizing the Casper-FFG protocol. The Beacon Chain is central to coordinating validators, and the LMD-GHOST fork-choice rule ensures the chain adheres to the path with the most accumulated validator votes. Validators are incentivized with rewards for their participation in proposing and verifying blocks, but face stringent penalties, known as slashing, for any malicious actions or prolonged inactivity. This design choice by Ethereum aims to significantly enhance energy efficiency, security, and scalability, with ongoing and future upgrades, such as Proto-Danksharding, further targeting improvements in transaction processing efficiency, thereby benefiting Base as its foundational security layer. Base specifically leverages Optimistic Rollups as part of the OP Stack, meaning transactions are presumed valid unless challenged within a specified period via fault proofs.

Berachain employs a distinct consensus mechanism known as Proof-of-Liquidity (PoL), designed to enhance network security and align participant incentives. Under PoL, network validators are responsible for securing the chain by staking a quantity of the native gas token, $BERA. The probability of a particular validator being chosen to propose a new block is directly correlated with the total amount of $BERA they have actively staked. This means that validators with larger stakes have a proportionally higher chance of being selected for block production. When a validator successfully proposes a block and it is added to the blockchain, they receive rewards. These rewards are distributed in the form of $BGT, which stands for Bera Governance Token. The volume of $BGT awarded to a validator is not solely based on their staked $BERA but is also significantly influenced by the level of $BGT delegation they have garnered from other network participants. This delegation mechanism allows individuals who hold $BGT but may not wish to operate a validator to contribute to the network's security and governance by delegating their tokens to validators they trust. The overall design of PoL aims to create a symbiotic relationship where validators, various protocols operating on Berachain, and individual users are all motivated to contribute to the long-term health and stability of the network. This comprehensive approach ensures that all key stakeholders have a vested interest in the chain's performance and security, fostering a robust and sustainable ecosystem. The system encourages active participation and capitalizes on the liquidity provided by users, differentiating it from traditional Proof-of-Stake models.

The Binance Smart Chain (BSC) network utilizes a hybrid consensus mechanism known as Proof of Staked Authority (PoSA). This innovative approach integrates key elements from both Delegated Proof of Stake (DPoS) and Proof of Authority (PoA) to achieve a balance of high transaction speeds, cost-efficiency, and network security, while striving to maintain a reasonable level of decentralization. The core participants in the PoSA mechanism include Validators, referred to as "Cabinet Members," Delegators, and Candidates.

Validators play a critical role, being responsible for creating new blocks, verifying transactions, and upholding the overall security of the network. To qualify as a validator, an entity must stake a substantial quantity of BNB, which serves as collateral to ensure honest conduct. These validators are selected through a dynamic process that considers both the amount of BNB they have staked and the votes they receive from token holders. At any given time, there are 21 active validators, whose rotation aims to enhance decentralization and security. Delegators are token holders who opt not to operate a validator node themselves but can contribute to network security by delegating their BNB tokens to chosen validators. This delegation bolsters a validator's total stake, increasing their likelihood of being selected for block production. In return, delegators receive a share of the rewards earned by their chosen validators, fostering broader participation in network governance and security. Candidates represent potential validators who have met the minimum BNB staking requirements and are awaiting election into the active validator set through community voting. Their presence ensures a continuous pool of ready-to-serve nodes, contributing to the network's resilience and decentralization.

During the consensus process, validators are chosen based on their accumulated BNB stake and delegator votes. The higher these metrics, the greater the chance of selection for validating transactions and producing new blocks. Once selected, these validators take turns in a PoA-like fashion to produce blocks rapidly and efficiently, validating transactions, adding them to blocks, and broadcasting them across the network. BSC boasts fast block times, typically around 3 seconds, leading to quick transaction finality. This rapid finality is a direct benefit of the efficient PoSA mechanism, which allows validators to reach consensus swiftly. To further ensure network integrity, validators face economic incentives such as slashing, where a portion of their staked BNB can be forfeited if they engage in malicious activities. This mechanism aligns validators' interests with the network's well-being, complementing the rewards they receive for their honest participation.

The Ethereum blockchain network, following "The Merge" in 2022, operates on a Proof-of-Stake (PoS) consensus mechanism, a significant departure from its previous Proof of Work system. This transition replaced energy-intensive mining with validator staking, aiming to enhance energy efficiency, security, and scalability. In this model, participants willing to secure the network act as validators by staking a minimum of 32 units of the network's native asset (Ether). The network organizes its operations around a precise slot and epoch system. Every 12 seconds, a validator is randomly selected to propose a new block. Following this proposal, other validators on the network verify the integrity and validity of the block. Finalization of transactions, meaning they become irreversible, occurs after approximately two epochs, which translates to about 12.8 minutes, utilizing the Casper-FFG (Friendly Finality Gadget) protocol. The Beacon Chain plays a central role in coordinating the activities of these validators, while the LMD-GHOST (Latest Message Driven-Greedy Heaviest Observed SubTree) fork-choice rule is employed to ensure all network participants agree on the canonical chain, following the branch with the heaviest accumulated validator votes. Validators are economically incentivized for their honest participation in proposing and verifying blocks, but they also face severe penalties, known as slashing, for malicious actions or prolonged inactivity. This PoS framework is designed not only to reduce the network's environmental footprint but also to lay the groundwork for future upgrades, such as Proto-Danksharding, which are intended to further improve transaction efficiency and overall network throughput. The core components like validator selection, block production, and transaction finality are intrinsically tied to the amount of Ether staked, ensuring that participants have a vested interest in the network's security and stability.

The Sonic network employs a sophisticated consensus mechanism that integrates Proof-of-Stake (PoS) with a Directed Acyclic Graph (DAG) architecture. This hybrid approach is specifically designed to enhance the network's scalability, efficiency, and overall performance. In a traditional PoS system, validators are chosen to create new blocks and validate transactions based on the amount of native tokens they have staked as collateral. For Sonic, validators must commit a substantial amount, specifically a minimum of 500,000 of the network's native $S tokens, to operate a validator node. This significant staking requirement acts as a powerful economic incentive, aligning validators' financial interests with the integrity and security of the network. By requiring a large stake, the network aims to deter malicious behavior, as validators would risk losing a substantial investment if they act dishonestly. The incorporation of a DAG architecture alongside PoS further distinguishes Sonic's consensus. While PoS determines who can validate, the DAG structure optimizes how transactions are ordered and processed. Unlike linear blockchains where transactions are added one block at a time, a DAG allows for parallel processing of multiple transactions simultaneously. This non-linear structure significantly boosts throughput and reduces latency, addressing common scalability challenges faced by many blockchain networks. For instance, the DAG enables transactions to be confirmed quickly without waiting for a new block to be fully formed and validated sequentially. This combination ensures that the Sonic network can handle a high volume of transactions efficiently, maintaining robust security through its PoS component while leveraging the speed and parallelism of its DAG architecture to provide a highly scalable and responsive platform for users and developers. This makes Sonic well-suited for applications demanding rapid transaction finality and high processing capacity.

Incentive Mechanisms and Applicable Fees

Euler is present on the following networks: Arbitrum, Avalanche, Base, Berachain, Binance Smart Chain, Ethereum, Sonic.

Arbitrum One, serving as a Layer 2 scaling solution for Ethereum, incorporates a sophisticated array of incentive mechanisms to guarantee the ongoing security and integrity of its network. Central to this framework are the Validators and Sequencers. Sequencers are entrusted with the vital task of ordering user transactions and compiling them into batches for efficient off-chain processing, playing a critical role in optimizing network throughput and speed. Validators, conversely, actively monitor the Sequencers' activities, meticulously verifying state transitions and ensuring that only valid transactions are included in the batches. Both Sequencers and Validators are motivated through economic rewards, primarily derived from collected transaction fees and potentially other protocol-specific incentives, contingent on their honest and efficient performance.

Arbitrum’s security model is heavily reliant on its Fraud Proofs system. Transactions processed off-chain are initially given an "assumption of validity," which enables swift transaction finality and higher throughput. However, a predefined "challenge period" is established, during which any network participant can submit a fraud proof to contest the validity of a transaction. This acts as a powerful deterrent against malicious behavior. If a challenge is successfully brought forward, an interactive verification process is initiated to precisely identify and confirm any fraudulent activity. In instances where fraud is proven, the invalid transaction is reversed, and the dishonest actor faces economic penalties, which may include the slashing of staked tokens or other forms of financial disincentive. This balanced system of rewards for honest participation and strict penalties for malicious actions aligns participants' interests with the overall health and security of the Arbitrum network.

The Applicable Fees on the Arbitrum One blockchain are structured to be cost-effective. Users pay Layer 2 Fees for transactions executed on the Arbitrum network, which are typically significantly lower than those on the Ethereum mainnet due to reduced computational load. A specific "Arbitrum Transaction Fee" is applied to each transaction processed by the sequencer, covering the costs of processing and batch inclusion. Additionally, L1 Data Fees are incurred when batches of Layer 2 state updates are periodically posted as calldata to the Ethereum mainnet. This fee covers the requisite gas costs on Ethereum. A key economic benefit is "cost sharing," where the fixed expenses of submitting these state updates to Ethereum are distributed across multiple transactions within a batch, substantially lowering the per-transaction cost for users. For example, protocols leveraging the Arbitrum stack, such as Kinto, utilize ETH for transaction fee payments.

The Avalanche blockchain network employs a comprehensive system of incentive mechanisms and fees designed to ensure its security, integrity, and efficiency, primarily through its Avalanche Consensus mechanism. Validators, who are critical to the network's operation, are required to stake a certain amount of AVAX tokens. The quantity of staked tokens directly influences their likelihood of being chosen to propose or validate new blocks. In return for their active participation, validators receive rewards, which are calculated proportionally to the amount of AVAX they have staked, as well as their consistent uptime and overall performance in validating transactions. To further decentralize participation, validators can also accept delegations from other token holders. These delegators subsequently share in the earned rewards, thus incentivizing smaller token holders to contribute indirectly to the network's security. The economic incentives for validators extend beyond staking rewards to include block rewards, which are distributed from the inflationary issuance of new AVAX tokens for proposing and validating blocks. Additionally, validators earn a portion of the transaction fees paid by users across the network, covering simple transactions, complex smart contract interactions, and the creation of new assets. Crucially, Avalanche's penalty system differs from some other Proof-of-Stake systems by not employing 'slashing,' which involves the confiscation of staked tokens for misbehavior. Instead, the network relies on the economic disincentive of lost future rewards. Validators who fail to maintain consistent uptime or engage in malicious activities will simply miss out on potential earnings, providing a strong incentive for honest and reliable behavior. The network also imposes clear uptime requirements, where poor performance directly impacts a validator's ability to earn rewards. Fees on the Avalanche blockchain are structured to be dynamic, adjusting based on current network demand and the computational complexity of transactions. This ensures that fees remain equitable and reflect the actual network usage. A significant portion of these transaction fees is 'burned,' meaning they are permanently removed from circulation. This deflationary mechanism helps to offset the inflationary effects of block rewards and aims to enhance the long-term value of AVAX tokens. Fees for deploying and interacting with smart contracts are determined by the required computational resources, promoting efficient resource utilization. Similarly, fees are imposed for creating new assets on the network, a measure designed to deter spam and ensure that network resources are utilized by serious projects. On the Avalanche X-Chain, validator incentives are realized indirectly through the network's overall AVAX issuance, while its transaction fees are fixed and burned to combat spam and progressively reduce the total supply of AVAX.

The Base blockchain, as an Ethereum Layer-2 solution utilizing Optimistic Rollups from the OP Stack, implements incentive mechanisms primarily focused on optimizing transaction costs and ensuring secure asset transfers, leveraging the economic security of its underlying Ethereum L1. A core incentive to use Base is its efficiency in reducing transaction expenses. This is achieved by a sequencer that bundles numerous L2 transactions together, submitting them as a single, consolidated L1 transaction to Ethereum. This process significantly lowers the average transaction cost for individual L2 operations, as the collective L2 transactions share the cost of the single L1 transaction fee, thereby making Base a more economically attractive option compared to direct L1 usage.

For the secure movement of crypto-assets between Base and Ethereum, a specialized smart contract on the Ethereum network is employed. Since Base, as an L2, does not manage its own consensus for fund withdrawals, an additional mechanism is in place to guarantee that only legitimate funds can be moved off the L2. When a user initiates a withdrawal request on Ethereum's L1, a predetermined challenge period begins. During this window, any other network participant has the opportunity to submit a "fault proof" if they detect a fraudulent withdrawal attempt, triggering a dispute resolution process. This entire system is strategically designed with economic incentives to encourage honest behavior and deter malicious activities, although specific details of these economic incentives for fault proof submission are not explicitly outlined beyond the general principle.

Furthermore, Base inherits and benefits from the robust incentive structure of Ethereum’s Proof-of-Stake (PoS) system, which indirectly secures Base transactions. Ethereum validators, by staking a minimum of 32 ETH, are rewarded for proposing and attesting to valid blocks, as well as for participating in sync committees. These rewards are distributed through newly issued ETH and a portion of transaction fees. Under the EIP-1559 fee model, transaction fees comprise a base fee, which is algorithmically burned to manage supply, and an optional priority fee (or 'tip') paid directly to validators. To maintain network integrity, validators face economic penalties, known as slashing, if they engage in malicious conduct or fail to perform their duties. This comprehensive incentive framework ensures strong security alignment for Base by reinforcing reliable validator behavior on its underlying L1.

The economic framework of the Berachain network is meticulously structured to provide robust incentive mechanisms for all participants, including validators and delegators, while also establishing clear transaction fee protocols. Participants are primarily incentivized through a combination of staking rewards and supplementary protocol-provided incentives. Validators, who are crucial for block production and network security, earn rewards in $BGT (Bera Governance Token) for their successful contributions. The magnitude of these $BGT rewards is dynamically determined by a factor referred to as their "boost." This boost is calculated as a percentage derived from the validator's specific $BGT boost relative to the cumulative $BGT boosted across all validators within the network. A higher boost translates to a greater share of the overall $BGT emissions. Furthermore, validators possess the ability to direct their earned $BGT emissions to pre-approved "Reward Vaults" of their choice. In return for this redirection, they receive additional protocol-provided incentives from these designated Reward Vaults, creating a diversified income stream and fostering integration with various ecosystem protocols. Delegators, on the other hand, play a vital role by staking their own $BGT with selected validators. By doing so, they not only strengthen the validator's boost, thereby increasing the validator's potential $BGT rewards, but they also partake in a share of the resulting rewards. This delegation system allows for broader participation in network governance and economic benefits. Regarding transactional costs, all fees for operations on the Berachain network are denominated and paid using the native gas token, $BERA. Crucially, these collected $BERA transaction fees are systematically burned, meaning they are permanently removed from the circulating supply. This deflationary mechanism contributes to the scarcity and long-term value proposition of the $BERA token while ensuring that all participants are continuously motivated to contribute to the network's security, efficiency, and overall sustainability.

The Binance Smart Chain (BSC) network employs a robust system of incentive mechanisms and applicable fees, primarily built around its Proof of Staked Authority (PoSA) consensus, designed to secure the network, encourage participation, and maintain operational efficiency. This system ensures that validators, delegators, and other participants are economically motivated to act in the network's best interest.

Validators on BSC, often referred to as "Cabinet Members," are critical to the network's operation. They are incentivized through staking rewards, which include a combination of transaction fees and newly generated block rewards. To become a validator, a significant amount of BNB must be staked. Their selection for block production is determined by the total BNB staked, encompassing both their own stake and delegated tokens, as well as the votes received from delegators. This competitive selection process motivates validators to attract delegators and maintain high performance. Delegators, in turn, are crucial for supporting network decentralization and security. By delegating their BNB to validators, they increase the validators' total stake, enhancing their chances of selection. In exchange, delegators receive a share of the rewards earned by their chosen validators, fostering active community involvement. The system also includes a pool of Candidates, nodes that have staked BNB and are ready to become active validators, ensuring a robust and resilient network of potential participants. Economic security is further reinforced through slashing mechanisms, where validators found engaging in malicious behavior or failing to perform their duties face penalties, including the forfeiture of a portion of their staked BNB. The opportunity cost of locking up BNB also provides a strong economic incentive for all participants to act honestly.

BSC is known for its low transaction fees, which are paid in BNB. These fees are vital for network maintenance and compensate validators for processing transactions. The fee structure is dynamic, adjusting based on network congestion and transaction complexity, though it is designed to remain significantly lower than on some other major blockchain networks, such as the Ethereum mainnet. In addition to transaction fees, validators receive block rewards, further incentivizing their role in maintaining and processing network activity. BSC also supports cross-chain compatibility, enabling asset transfers between Binance Chain and Binance Smart Chain, which incur minimal fees to facilitate a seamless user experience. Furthermore, interacting with and deploying smart contracts on BSC involves fees based on the computational resources required. These smart contract fees are also paid in BNB and are structured to be cost-effective, encouraging developers to build and innovate on the BSC platform.

The Ethereum network's Proof-of-Stake (PoS) system is underpinned by a robust framework of incentive mechanisms and applicable fees, meticulously designed to secure transactions and encourage active, honest participation from validators. Validators, who are essential for the network's operation, commit at least 32 units of the network's native asset (Ether) to secure their role. Their primary incentives include rewards for successfully proposing new blocks, attesting to the validity of other blocks, and participating in sync committees, all of which contribute to the network's integrity and consensus. These rewards are distributed in newly issued Ether, alongside a portion of the transaction fees generated on the network. A key feature of Ethereum's fee structure is the implementation of EIP-1559, which divides transaction fees into two main components. The first is a base fee, which is automatically burned, effectively reducing the overall supply of Ether over time and potentially introducing a deflationary aspect, especially during periods of high network activity. The second is an optional priority fee, also known as a "tip," which users can choose to pay directly to validators to incentivize faster inclusion of their transactions into a block. This dual-fee structure aims to make transaction costs more predictable for users. To enforce honest behavior and prevent malicious activities, the network employs a strict system of economic penalties, including slashing. Validators who engage in dishonest acts or demonstrate extended periods of inactivity risk losing a portion of their staked Ether, providing a powerful deterrent against misconduct and ensuring the long-term security and reliability of the network. This comprehensive system aligns the economic interests of validators with the overall health and security of the Ethereum blockchain.

The Sonic network’s economic framework is meticulously structured to foster robust and continuous participation from both validators, who secure the network, and developers, who build on it. At the core of its incentive model, validators are remunerated through a dual system comprising block rewards and transaction fees. The block reward mechanism is particularly dynamic, operating on an Annual Percentage Rate (APR) model that adjusts to network conditions, ensuring competitive returns for validators and maintaining an adequate level of network security. This dynamic APR is a key feature, designed to adapt incentives to the evolving needs and activity levels of the blockchain. Beyond block rewards, validators also accrue a portion of the transaction fees levied on network activities. These fees are a crucial component of the economic security model, directly compensating validators for the computational resources and bandwidth expended in processing and verifying transactions. This dual reward system encourages validators to maintain high uptime and honest behavior, as their earnings are directly tied to their performance and the overall health of the network. Such incentive mechanisms are common in Proof-of-Stake systems, where participants, by locking up a certain amount of native tokens, gain the right to validate transactions and earn rewards, thereby aligning their financial interests with the network's stability. While the provided information specifically highlights block rewards and transaction fees with a dynamic APR for Sonic, typical PoS networks often include additional elements to bolster economic security and incentivize broad participation. For example, some PoS systems incorporate "slashing" mechanisms, where validators acting maliciously or failing to perform their duties risk losing a portion of their staked tokens. This acts as a strong deterrent against dishonest actions. Moreover, many PoS networks enable token holders who do not wish to run a full validator node to "delegate" their tokens to existing validators, thereby sharing in the rewards and enhancing network decentralization. Although these specific additional mechanisms like slashing or explicit delegation for delegators are not detailed for Sonic in the provided text, the emphasis on a dynamic APR and transaction fees points to a system designed to attract and retain participants necessary for a secure and vibrant blockchain ecosystem. The network's design also implicitly encourages developers by providing a stable and efficient platform, where predictable costs and reliable transaction processing are essential for decentralized application deployment and user adoption.

Energy consumption sources and methodologies

Euler is present on the following networks: Arbitrum, Avalanche, Base, Berachain, Binance Smart Chain, Ethereum, Sonic.

The methodology employed for calculating the energy consumption attributed to the Arbitrum network adopts a "bottom-up" approach, systematically assessing individual operational components to arrive at an aggregate consumption figure. Within this framework, network nodes are identified as the central and most significant contributors to the network's overall energy footprint. The foundational assumptions underpinning these calculations are derived from empirical findings, which are compiled through the extensive use of publicly available information sites, proprietary in-house crawlers developed by the assessors, and various open-source data collection tools.

A crucial step in estimating energy consumption involves accurately determining the specific hardware devices utilized within the network. This determination is made by evaluating the technical requirements necessary for operating the client software pertinent to the Arbitrum network. Once these hardware profiles are established, their corresponding energy consumption rates are precisely measured under controlled conditions in certified test laboratories, ensuring a high degree of accuracy and reliability for the baseline data. To ensure a comprehensive and accurate scope, particularly when accounting for diverse implementations of crypto-assets across different networks, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is employed whenever such an identifier is available. This tool assists in clearly delineating all relevant instances of an asset, with these mappings consistently updated based on data provided by the Digital Token Identifier Foundation.

Furthermore, the methodology relies on specific assumptions regarding the type of hardware deployed and the estimated number of active participants within the network. These assumptions are subjected to continuous validation using best-effort empirical data. A general guiding principle in these estimations is the presumption that network participants act in a largely economically rational manner. In accordance with a precautionary principle, conservative estimates are applied whenever there is uncertainty, typically resulting in higher assessments of potential adverse environmental impacts. When quantifying the energy consumption for a particular crypto-asset operating on Arbitrum, a proportionate fraction of the overall network's energy consumption is allocated to that asset, based on its observed activity within the Arbitrum ecosystem. The source documents do not provide any direct external links related to this methodology.

The methodology for assessing the Avalanche network's energy consumption is founded on a 'bottom-up' approach, where individual nodes are identified as the primary contributors to the network's overall energy footprint. This comprehensive calculation aggregates energy usage across various interconnected components of the network. The assumptions underpinning these calculations are derived from extensive empirical findings, utilizing a combination of publicly available information sites, sophisticated open-source crawlers, and proprietary in-house developed crawlers. A key aspect of this methodology involves estimating the hardware deployed within the network. This estimation is primarily driven by the technical specifications and operational requirements for running the client software, which dictates the type and performance of necessary hardware devices. The energy consumption profiles of these identified hardware devices are meticulously measured in certified test laboratories to ensure accuracy. To ensure a broad and precise scope, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is leveraged, whenever available, to pinpoint all relevant implementations of the crypto-asset under consideration. These mappings are regularly updated based on current data provided by the Digital Token Identifier Foundation. The data regarding specific hardware usage and the total number of network participants is based on empirically verified assumptions, consistently updated with best-effort validation. A foundational assumption in this model is that network participants generally behave in an economically rational manner. Furthermore, adhering to a precautionary principle, any uncertainties or doubts during the estimation process lead to conservative assumptions, specifically by making higher estimates for potential adverse environmental impacts. When determining the energy consumption attributable to a specific token within the Avalanche ecosystem, the energy consumption of the entire Avalanche network (including subnets like Avalanche X-Chain) is calculated first. Subsequently, a fraction of this total network energy is allocated to the token, proportional to its activity and footprint within the network. This detailed, multi-layered approach aims to provide a robust and conservative estimate of the energy consumption associated with the Avalanche blockchain.

The energy consumption calculation for the Base blockchain network is meticulously performed using a "bottom-up" approach, where individual nodes are identified as the primary contributors to the network's overall energy footprint. This methodology is based on empirical data collected from a variety of sources, including publicly available information sites, dedicated open-source crawlers, and proprietary in-house crawling tools. The fundamental aspect of estimating hardware usage within the network involves determining the minimum requirements necessary to operate the client software. The energy consumption profiles of the specific hardware devices identified are obtained from measurements conducted in certified test laboratories, ensuring a high degree of accuracy in these foundational figures.

In the process of calculating network energy consumption, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is utilized when available, serving to identify and encompass all relevant implementations of a crypto-asset within the scope of analysis. These mappings are regularly updated, drawing on data provided by the Digital Token Identifier Foundation. However, the source documents do not provide specific URLs for the public information sites, open-source crawlers, or the Digital Token Identifier Foundation, preventing direct external linking within this summary.

The methodology also incorporates assumptions regarding the hardware deployed and the number of participants operating within the network. These assumptions are rigorously verified with "best effort" against empirical data to ensure their realism and accuracy. A key underlying principle is the assumption that network participants generally act in a "largely economically rational" manner. Furthermore, to adhere to a precautionary principle, conservative estimates are applied in situations of uncertainty, leading to higher projected impacts to mitigate underestimation risks. For a specific token on Base, a fraction of the network’s total energy consumption is attributed, based on the token's activity within the network.

For evaluating the energy consumption of the Berachain network, a meticulous "bottom-up" methodological approach is rigorously applied. This methodology posits that the individual nodes operating within the network constitute the primary determinants of its overall energy footprint. The underlying assumptions supporting these calculations are derived from a combination of empirical observations and data gathered through various sources, including publicly available information websites, open-source crawling tools, and specialized crawlers developed in-house for proprietary data collection. A critical aspect of estimating energy consumption involves accurately identifying and quantifying the hardware utilized across the network. The main factor guiding these estimations is the hardware specifications required to effectively run the client software for the Berachain network. Once the hardware components are identified, their respective energy consumption values are sourced from measurements conducted in certified test laboratories, ensuring a high degree of accuracy and reliability for the power consumption figures. In the process of calculating total energy consumption, if applicable and available, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is employed. This identifier helps in scoping all relevant implementations of the crypto-asset in question, with mappings regularly updated based on data from the Digital Token Identifier Foundation. It is important to note that information concerning the specific hardware deployed and the precise number of participants active within the network is often based on estimations. These estimations are, however, subjected to best-effort verification using empirical data. A general underlying assumption is that network participants predominantly act with economic rationality. Furthermore, as a precautionary principle, in situations of uncertainty or doubt, assumptions are consistently made on the conservative side. This means that higher estimates for potential adverse impacts, such as energy consumption, are favored to ensure a robust and cautious assessment of the network's environmental footprint. The document does not provide specific external URLs for these sources or methodologies.

The methodology for calculating the energy consumption of the Binance Smart Chain (BSC) network, which then serves as a basis for attributing a fraction of energy to tokens operating on it, primarily utilizes a "bottom-up" approach. This method focuses on the individual components of the network to aggregate a comprehensive energy profile. The central factor in this calculation is identified as the network nodes themselves.

Assumptions regarding the hardware used within the BSC network are derived from extensive empirical findings. These findings are gathered through a combination of public information sites, sophisticated open-source crawlers, and proprietary in-house developed crawlers. The primary determinants for estimating the specific hardware deployed are the technical requirements necessary to operate the client software of the network. To ensure accuracy, the energy consumption of these identified hardware devices is rigorously measured in certified test laboratories. This precise measurement allows for a detailed understanding of the power demands of the operational infrastructure.

For the comprehensive identification of all implementations of an asset within scope, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is employed, where available. The mappings associated with the FFG DTI are regularly updated based on data provided by the Digital Token Identifier Foundation. The information regarding both the hardware in use and the total number of participants active within the network is based on assumptions that undergo best-effort verification using empirical data. Generally, participants are presumed to be largely economically rational in their decision-making. As a precautionary principle, in situations of uncertainty, assumptions tend to err on the conservative side, meaning higher estimates are made for potential adverse impacts. When determining the energy consumption for a specific token that operates on BSC, the initial step involves calculating the energy consumption of the entire Binance Smart Chain network. Following this, a fraction of the total network energy consumption is attributed to the particular crypto-asset, a fraction determined by the asset's specific activity within the network.

The methodology for calculating the Ethereum network's energy consumption primarily employs a "bottom-up" approach, which focuses on the energy demands of individual nodes that are central to the network's operation. These nodes are considered the fundamental factor driving the network's overall energy use. The assumptions underpinning these calculations are derived from empirical data gathered through a variety of sources, including public information sites, open-source crawlers, and proprietary in-house crawlers developed for this purpose. A critical step in this methodology involves determining the hardware used within the network, primarily by assessing the computational and other requirements necessary to run the client software. The energy consumption characteristics of these identified hardware devices are then rigorously measured in certified test laboratories to ensure accuracy. When quantifying the energy consumption for the network, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is utilized, when available, to identify all implementations of the asset in scope, with mappings regularly updated based on data from the Digital Token Identifier Foundation. The information regarding the specific hardware deployed and the total number of participants in the network relies on assumptions that are diligently verified using empirical data whenever possible. Generally, participants are presumed to act in an economically rational manner. Furthermore, adhering to a precautionary principle, if there is any doubt in estimations, conservative assumptions are made, meaning higher estimates are used for potential adverse impacts to ensure a comprehensive and cautious assessment of energy consumption.

The methodology for calculating the energy consumption of the Sonic network primarily employs a "bottom-up" approach, which focuses on the granular details of the network's operational infrastructure. This method considers the individual nodes as the fundamental units contributing to the network's overall energy footprint. To derive these consumption figures, assumptions are made based on extensive empirical data, gathered through a combination of publicly available information sites, proprietary in-house crawlers, and various open-source data collection tools. A critical aspect of this methodology involves accurately estimating the hardware utilized across the network. The main criteria for these estimations are the technical specifications and operational requirements necessary to run the client software for the Sonic network. Once the hardware profiles are identified, their energy consumption values are determined through rigorous measurements conducted in certified test laboratories, ensuring accuracy and reliability of the data. Furthermore, in the calculation process, if available, the Functionally Fungible Group Digital Token Identifier (FFG DTI) is used to comprehensively identify all relevant implementations of the crypto-asset within the scope of analysis. These mappings are regularly updated, leveraging data provided by the Digital Token Identifier Foundation, to ensure the most current and accurate representation of the network's components. The data concerning hardware usage and the total number of participants within the network is also founded on assumptions. These assumptions are meticulously verified through best-effort empirical data analysis. Fundamentally, participants are generally presumed to act in an economically rational manner. To maintain a conservative stance in the energy consumption estimates, especially when facing uncertainties, a precautionary principle is applied, which means that higher estimates are preferred for potential adverse impacts. This approach ensures that the reported energy consumption figures are robust and reflect a cautious assessment of the network's environmental impact.

Key energy sources and methodologies

Euler is present on the following networks: Avalanche, Binance Smart Chain, Ethereum, Sonic.

The methodology for determining the key energy sources and the proportion of renewable energy utilized by the Avalanche blockchain network relies on a multi-pronged approach that integrates geographical data with energy mix statistics. To ascertain the percentage of renewable energy consumption, the initial step involves accurately identifying the geographical locations of the network's nodes. This crucial data is gathered through a combination of public information sites, advanced open-source crawlers, and proprietary in-house crawlers developed specifically for this purpose. In instances where comprehensive geographical distribution information for the nodes is not readily available, the methodology pivots to utilizing 'reference networks.' These reference networks are carefully selected for their comparability to Avalanche in terms of their incentivization structures and underlying consensus mechanisms, ensuring that the estimated renewable energy mix remains relevant and reflective of similar blockchain operations. Once the geographical data for the nodes (either directly identified or inferred from reference networks) is compiled, this geo-information is meticulously merged with comprehensive public data sets on electricity generation. A primary source for this integration is the data provided by Our World in Data, which offers detailed insights into the global energy landscape. The energy intensity of the network is then calculated as the marginal energy cost incurred for processing one additional transaction. This granular measurement provides a precise understanding of the energy overhead per unit of network activity. The specific datasets and sources referenced for this methodology include: Ember (2025) and the Energy Institute - Statistical Review of World Energy (2024), both of which undergo significant processing by Our World in Data. The dataset titled “Share of electricity generated by renewables – Ember and Energy Institute” is a key input, comprising original data from Ember’s “Yearly Electricity Data Europe” and “Yearly Electricity Data,” alongside the Energy Institute’s “Statistical Review of World Energy.” This information is publicly accessible at Share of electricity generated by renewables – Ember and Energy Institute.

To ascertain the proportion of renewable energy utilized by the Binance Smart Chain (BSC) network, a detailed methodology focuses on identifying the geographical distribution of its operational nodes. This process begins with leveraging a variety of data sources, including public information websites, general open-source crawlers, and specialized in-house developed crawlers. These tools collectively help pinpoint the physical locations where the network's nodes are hosted. The precise geographic distribution of these nodes is a crucial piece of information for accurately assessing renewable energy integration.

In instances where comprehensive information regarding the geographic distribution of nodes is unavailable or insufficient, the methodology incorporates a fallback mechanism. This involves using reference networks that exhibit comparable characteristics in terms of their incentivization structures and underlying consensus mechanisms. By analyzing the renewable energy usage patterns of these similar networks, an informed estimate can be made for BSC. Once geographical data for the nodes (either direct or inferred from reference networks) is established, this geo-information is meticulously merged with publicly accessible data from Our World in Data. This external dataset provides crucial insights into the share of electricity generated by renewables globally, drawing from sources like Ember (2025) and the Energy Institute’s Statistical Review of World Energy (2024). The integration of this data allows for a granular understanding of the renewable energy mix at the node locations.

Furthermore, the energy intensity of the network is calculated as the marginal energy cost with respect to one additional transaction. This metric quantifies the energy expenditure incurred for each incremental transaction processed on the network, providing a measure of its operational efficiency from an energy perspective. The consistent use of reputable public data sources and a robust methodology ensures transparency and accuracy in reporting the renewable energy profile of the Binance Smart Chain network.

To ascertain the proportion of renewable energy utilized by the Ethereum network, a specific set of methodologies is applied. The initial step involves pinpointing the geographical locations of the network's nodes. This crucial geo-information is gathered through various means, including publicly available information sites, as well as both open-source and internally developed crawlers designed to scan the network. In instances where comprehensive geographical data for nodes is not directly accessible, the analysis resorts to leveraging "reference networks." These are comparable networks chosen for their similar incentivization structures and consensus mechanisms, providing a proxy for node distribution. Once the geo-information is established, it is then integrated and cross-referenced with public data obtained from "Our World in Data." This comprehensive dataset offers insights into the energy mixes and renewable energy penetration across different regions globally. The final calculation of energy intensity is defined as the marginal energy cost incurred for processing one additional transaction on the network. This approach allows for an estimation of the energy footprint associated with scaling the network's transactional volume. For detailed information and the underlying data sources on the share of electricity generated by renewables, relevant information can be found through sources such as Ember (2025) and the Energy Institute - Statistical Review of World Energy (2024), with further processing by Our World in Data, accessible via Share of electricity generated by renewables – Ember and Energy Institute.

To accurately determine the proportion of renewable energy utilized by the Sonic network, a comprehensive methodology is employed, focusing on the geographic distribution of its operational nodes. This process begins with identifying the physical locations of these nodes through the use of various data collection tools, including public information sites, open-source crawlers, and specialized in-house crawlers. These tools collectively gather the necessary geo-information to pinpoint where the network's energy consumption is occurring. In scenarios where precise geographic distribution data for the nodes is unavailable or insufficient, the methodology incorporates a fallback mechanism. In such cases, reference networks that exhibit comparable incentivization structures and consensus mechanisms to Sonic are used as proxies. This allows for a reasonable estimation of renewable energy usage based on similar operational environments. Once the geo-information for the nodes (whether directly identified or inferred from reference networks) is established, it is then integrated with public data from reputable sources like Our World in Data. This integration allows for the correlation of node locations with regional electricity generation mixes, thereby providing a basis for calculating the proportion of energy derived from renewable sources. The energy intensity of the network is calculated as the marginal energy cost associated with processing one additional transaction. This metric offers insight into the incremental energy impact of network activity. The data sources for determining the share of electricity generated by renewables include Ember (2025); Energy Institute - Statistical Review of World Energy (2024) - with major processing by Our World in Data. These sources compile yearly electricity data for various regions, including Europe, providing a robust foundation for assessing renewable energy penetration in the grids powering Sonic's infrastructure. This detailed approach ensures that the network's renewable energy profile is estimated with a high degree of rigor and transparency.

Key GHG sources and methodologies

Euler is present on the following networks: Avalanche, Binance Smart Chain, Ethereum, Sonic.

The methodology employed to determine the Greenhouse Gas (GHG) emissions associated with the Avalanche blockchain network involves a detailed process of locating network infrastructure and integrating this geographical data with carbon intensity statistics. The initial step is to precisely identify the locations of the network's nodes, a task accomplished through the diligent use of public information sites, sophisticated open-source crawlers, and specialized in-house crawlers. This geographical mapping is fundamental to understanding the specific energy grids from which the nodes draw their power. In situations where direct geographical information on node distribution is insufficient, the methodology relies on 'reference networks.' These are selected based on their structural similarities to Avalanche, particularly concerning their incentivization mechanisms and consensus protocols, ensuring that the estimates are as representative as possible. The collected geo-information, whether direct or inferred, is then carefully integrated with public data regarding the carbon intensity of electricity generation. A significant source for this critical data is Our World in Data, which provides comprehensive global information on electricity generation’s carbon footprint. The GHG intensity of the network is quantified as the marginal emission generated per additional transaction processed. This metric allows for a precise evaluation of the environmental impact as network activity scales. The foundational data and citations for this methodology include: Ember (2025) and the Energy Institute - Statistical Review of World Energy (2024), which have been extensively processed by Our World in Data. The specific dataset used is titled “Carbon intensity of electricity generation – Ember and Energy Institute,” drawing original data from Ember’s “Yearly Electricity Data Europe” and “Yearly Electricity Data,” as well as the Energy Institute’s “Statistical Review of World Energy.” This crucial resource for carbon intensity data is available under a CC BY 4.0 license at Carbon intensity of electricity generation – Ember and Energy Institute.

The methodology for determining the Greenhouse Gas (GHG) Emissions associated with the Binance Smart Chain (BSC) network, much like the energy consumption assessment, places a strong emphasis on geographically situating its operational nodes. The initial step involves identifying the physical locations of these nodes, which is achieved through a combination of public information sites, open-source crawlers, and specialized in-house developed crawlers. Accurately mapping these locations is fundamental, as regional electricity mixes and their associated carbon footprints vary significantly.

In situations where detailed geographical information for all nodes is not readily available, the methodology incorporates a pragmatic approach. This involves utilizing reference networks that share similar characteristics, specifically in their incentivization structures and consensus mechanisms. By studying these comparable networks, reasonable inferences can be made about the likely geographic distribution and, consequently, the emissions profile of BSC's nodes. Once the geographic data is gathered or estimated, it is then meticulously integrated with publicly available information from Our World in Data. This authoritative dataset provides critical data on the carbon intensity of electricity generation across various regions, compiling information from sources such as Ember (2025) and the Energy Institute’s Statistical Review of World Energy (2024).

This integration allows for the calculation of GHG emissions based on the electricity consumption at specific node locations and the carbon intensity of those regional grids. The intensity of GHG emissions for the network is specifically calculated as the marginal emission with respect to one additional transaction. This metric quantifies the increase in GHG emissions for each incremental transaction processed on the network, offering a direct measure of its environmental impact per unit of activity. The entire process adheres to a principle of transparency, utilizing established external data sources and a consistent approach to ensure the reported GHG emissions are as accurate and comprehensive as possible, always acknowledging that the data from Our World in Data is licensed under CC BY 4.0.

The methodology for determining the Greenhouse Gas (GHG) emissions of the Ethereum network closely mirrors the approach used for energy consumption, focusing on identifying emission sources and their quantification. The initial and fundamental step involves precisely identifying the geographical locations of the network's operational nodes. This data collection is facilitated through a combination of publicly available information, as well as specialized open-source and proprietary crawlers designed to actively discover and map node distributions across the globe. Should there be an absence of specific geographic information for the nodes, the analysis intelligently defaults to utilizing "reference networks." These are carefully selected networks that exhibit comparable characteristics in terms of their incentivization structures and consensus mechanisms, providing a basis for estimating the geographic spread when direct data is unavailable. This collected geo-information is then meticulously integrated with publicly accessible data from "Our World in Data." This integration allows for the application of regional carbon intensity factors to the estimated energy consumption, thereby enabling the calculation of associated GHG emissions. The overall GHG intensity is quantified as the marginal emission generated per additional transaction processed on the network, offering a metric for the environmental impact of increased network activity. For detailed information and original data regarding the carbon intensity of electricity generation, sources include Ember (2025) and the Energy Institute - Statistical Review of World Energy (2024), processed by Our World in Data, available at Carbon intensity of electricity generation – Ember and Energy Institute. This resource is licensed under CC BY 4.0.

The assessment of Greenhouse Gas (GHG) emissions for the Sonic network follows a detailed methodology that hinges on the geographical locations of its operational nodes. The initial step involves pinpointing these locations, a task accomplished through a combination of public information sites, sophisticated open-source crawlers, and proprietary in-house crawlers designed to gather comprehensive geo-data. This crucial information forms the basis for understanding the environmental impact associated with the network's energy consumption. In situations where direct information regarding the geographical distribution of Sonic's nodes is not readily available, the methodology provides for the use of proxy data. This involves identifying and utilizing reference networks that are deemed comparable in terms of their incentivization structures and consensus mechanisms. By analyzing these similar networks, an informed estimation of GHG emissions can still be made, ensuring that the assessment remains robust even with data limitations. Once the relevant geo-information for the nodes is established, either directly or through comparable networks, it is then cross-referenced with public data from authoritative sources, specifically Our World in Data. This integration enables the determination of the carbon intensity of electricity generation in the regions where nodes operate. The GHG intensity of the Sonic network is precisely calculated as the marginal emission associated with processing one additional transaction. This metric quantifies the incremental carbon footprint attributed to each unit of network activity. Key data sources for this calculation include Ember (2025); Energy Institute - Statistical Review of World Energy (2024) - with major processing by Our World in Data. These resources provide comprehensive datasets on the carbon intensity of electricity generation, offering critical input for accurately estimating the network's GHG emissions. The methodology adheres to a licensing standard of CC BY 4.0, promoting transparency and reusability of the underlying data. This systematic approach ensures that the GHG emissions associated with the Sonic network are assessed with precision and based on verified environmental data.